Security Protocols XVIII (Record no. 53613)

000 -LEADER
fixed length control field 04580nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-662-45921-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111157.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141201s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783662459218
-- 978-3-662-45921-8
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Security Protocols XVIII
Sub Title 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 267 p. 19 illus.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security".
700 1# - AUTHOR 2
Author 2 Christianson, Bruce.
700 1# - AUTHOR 2
Author 2 Malcolm, James.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-662-45921-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithms.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Management information systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithm Analysis and Problem Complexity.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC

No items available.